Sentences with phrase «chain technology through»

Not exact matches

Many Chinese government offices have been public about their interest in taking advantage of the blockchain technology for tasks like tracking people and products moving through industrial supply chains.
Integrate aesthetics and function, agile supply chains and anticipate customer needs through technology.
Because the technology will be available through the Linux Foundation, developers at the DMV could find code for building a title - tracking block chain and adapt it to their needs at a lower cost, than hiring specialists to build it for them.
Actual results, including with respect to our targets and prospects, could differ materially due to a number of factors, including the risk that we may not obtain sufficient orders to achieve our targeted revenues; price competition in key markets; the risk that we or our channel partners are not able to develop and expand customer bases and accurately anticipate demand from end customers, which can result in increased inventory and reduced orders as we experience wide fluctuations in supply and demand; the risk that our commercial Lighting Products results will continue to suffer if new issues arise regarding issues related to product quality for this business; the risk that we may experience production difficulties that preclude us from shipping sufficient quantities to meet customer orders or that result in higher production costs and lower margins; our ability to lower costs; the risk that our results will suffer if we are unable to balance fluctuations in customer demand and capacity, including bringing on additional capacity on a timely basis to meet customer demand; the risk that longer manufacturing lead times may cause customers to fulfill their orders with a competitor's products instead; the risk that the economic and political uncertainty caused by the proposed tariffs by the United States on Chinese goods, and any corresponding Chinese tariffs in response, may negatively impact demand for our products; product mix; risks associated with the ramp - up of production of our new products, and our entry into new business channels different from those in which we have historically operated; the risk that customers do not maintain their favorable perception of our brand and products, resulting in lower demand for our products; the risk that our products fail to perform or fail to meet customer requirements or expectations, resulting in significant additional costs, including costs associated with warranty returns or the potential recall of our products; ongoing uncertainty in global economic conditions, infrastructure development or customer demand that could negatively affect product demand, collectability of receivables and other related matters as consumers and businesses may defer purchases or payments, or default on payments; risks resulting from the concentration of our business among few customers, including the risk that customers may reduce or cancel orders or fail to honor purchase commitments; the risk that we are not able to enter into acceptable contractual arrangements with the significant customers of the acquired Infineon RF Power business or otherwise not fully realize anticipated benefits of the transaction; the risk that retail customers may alter promotional pricing, increase promotion of a competitor's products over our products or reduce their inventory levels, all of which could negatively affect product demand; the risk that our investments may experience periods of significant stock price volatility causing us to recognize fair value losses on our investment; the risk posed by managing an increasingly complex supply chain that has the ability to supply a sufficient quantity of raw materials, subsystems and finished products with the required specifications and quality; the risk we may be required to record a significant charge to earnings if our goodwill or amortizable assets become impaired; risks relating to confidential information theft or misuse, including through cyber-attacks or cyber intrusion; our ability to complete development and commercialization of products under development, such as our pipeline of Wolfspeed products, improved LED chips, LED components, and LED lighting products risks related to our multi-year warranty periods for LED lighting products; risks associated with acquisitions, divestitures, joint ventures or investments generally; the rapid development of new technology and competing products that may impair demand or render our products obsolete; the potential lack of customer acceptance for our products; risks associated with ongoing litigation; and other factors discussed in our filings with the Securities and Exchange Commission (SEC), including our report on Form 10 - K for the fiscal year ended June 25, 2017, and subsequent reports filed with the SEC.
But the retail giant began using the technology in 2016 to track how pigs from China moved through the supply chain to the American table.
Examples of such projects providing marginal benefits are: improving financial reporting systems through better information technology, minor tweaks to supply chain logistics, cutting back on marketing or increasing low - cost advertising (like social media), «rationalization» of head count, holding average wages as low as possible, squeezing suppliers a little bit, not repatriating earnings to stave off taxation, refinancing rather than retiring debts, and the share buyback that is insensitive to a company's current stock price.
In this way Mfarm is changing the supply chain to the benefit of smallholders through the use of technology.
We met them in 2015 when they'd come to the realization that to be successful in hospitality they needed to engage restaurants chains and groups that could implement their technology to offer users a new dining experience through their MyCheck mobile app.
The Nov. 18, 2016 article about Wal - Mart using blockchain technology to track certain food products through the supply chain is one of the first such deployments.
A full - on globalization backlash could undermine hopes for shifting away from secular stagnation by derailing the nascent recovery in investment spending and productivity growth in the U.S. Global trade tends to boost productivity through fostering of competitive pressures, product specialization, scale economies, global value chains and technology transfer.
What We Do: Create better ways of doing business across the dairy supply chain through vital market intelligence and technology.
On behalf of red meat producers, MLA will host an enticing program of activities aimed to educate, celebrate, entertain and immerse attendees in all things Australian beef — and in particular new technologies and tools being used to drive value and innovation through the beef supply chain.
Rather, Amatil X would look for innovation in areas such as sustainability and customer experience and concepts for exploring new ways of getting customers what they want through, for example, new ordering platforms and supply chain technology.
As an Allied Member, ArrowStream will have the opportunity to further its knowledge of the foodservice distributors industry in order to better serve IFDA's members through supply chain management technology and logistics services.
Complementing this theme is next - generation robotics technology, which will be demonstrated through every step of the manufacturing chain, from incoming raw materials to outgoing finished product.
Make your way through foodpro's six zones, each dedicated to the various steps in the food manufacturing process: Ingredients, Food Science & Technology, Processing Equipment, Plant Equipment, Packaging and the new Supply Chain Integrity Zone.
We continuously strive to improve our performance through technology upgrade, scale leverage, optimization of product flows, best - in - class sourcing capabilities and tight cost management along the complete value chain.
Through a unique chain of expertise, including the BENEO - Institute that provides decisive insights into nutrition science and legislation, and the BENEO - Technology Center that consults in application technology, BENEO actively supports customers in the development of more balanced and healthy foodTechnology Center that consults in application technology, BENEO actively supports customers in the development of more balanced and healthy foodtechnology, BENEO actively supports customers in the development of more balanced and healthy food products.
The second phase includes both Altera and chip distributor SMT Corp., who will test Applied DNA's technology on a larger scale and at multiple steps through the supply chain, including existing chips already in circulation.
Plastic Logic has already established a partner program to work with leading global display makers and consumer electronics companies to enable flexible, plastic AMOLED supply chains through licensing and technology transfer to mass volume producers,» the press release revealed.
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
You agree not to engage in any of the following prohibited activities: (i) copying, distributing, or disclosing any part of the Service in any medium, including without limitation by any automated or non-automated «scraping»; (ii) using any automated system, including without limitation «robots,» «spiders,» «offline readers,» etc., to access the Service in a manner that sends more request messages to the Company servers than a human can reasonably produce in the same period of time by using a conventional on - line web browser (except that Humble Bundle grants the operators of public search engines revocable permission to use spiders to copy materials from Humble Bundle for the sole purpose of and solely to the extent necessary for creating publicly available searchable indices of the materials, but not caches or archives of such materials); (iii) transmitting spam, chain letters, or other unsolicited email; (iv) attempting to interfere with, compromise the system integrity or security or decipher any transmissions to or from the servers running the Service; (v) taking any action that imposes, or may impose in our sole judgment an unreasonable or disproportionately large load on our infrastructure; (vi) uploading invalid data, viruses, worms, or other software agents through the Service; (vii) collecting or harvesting any personally identifiable information, including account names, from the Service; (viii) using the Service for any commercial solicitation purposes; (ix) impersonating another person or otherwise misrepresenting your affiliation with a person or entity, conducting fraud, hiding or attempting to hide your identity; (x) interfering with the proper working of the Service; (xi) accessing any content on the Service through any technology or means other than those provided or authorized by the Service; (xii) bypassing the measures we may use to prevent or restrict access to the Service, including without limitation features that prevent or restrict use or copying of any content or enforce limitations on use of the Service or the content therein; (xiii) sell, assign, rent, lease, act as a service bureau, or grant rights in the Products, including, without limitation, through sublicense, to any other entity without the prior written consent of such Products» (defined below) licensors; (xiv) circumventing Service limitations on the number of Products you may purchase, including, without limitation, creating multiple accounts and purchasing a total number of Products through such multiple accounts which exceed the per - user limitations; or (xv) except as otherwise specifically set forth in a licensor's end user license agreement, as otherwise agreed upon by a licensor in writing or as otherwise allowed under applicable law, distributing, transmitting, copying (other than re-installing software or files previously purchased by you through the Service on computers, mobile or tablet devices owned by you, or creating backup copies of such software or files for your own personal use) or otherwise exploiting the Products (defined below) in any manner other than for your own private, non-commercial, personal use.
Having ambitious carbon - reduction targets allows us to drive forward innovation, develop new energy - saving technologies and share our know - how through the supply chain and beyond to increase efficiency on a global scale.»
Through strict supply chain segregation and traceability technology, actors all along the certified supply chain have the ability to identify the origin of the cocoa they purchase.
It states that its EXCHAIN solution uses blockchain technology to offer a fully automated and cost - effective method of delivering advertising campaigns and providing immutable proof of evidence chains, enabling fully tracked, verified and audited ad spend through clean and direct advertising inventory sources.
Walton's developers hope their technology will be able to streamline the entire supply chain process, from manufacturing right through to the retail experience.
In January 2018, NXT will be launching a blockchain - as - a-service platform known as Ador to help users utilize their blockchain technology through the use of child chains.
Alibaba's T - Mall e-commerce platform is reportedly adopting blockchain technology in its cross-border supply chain through a partnership with logistics company Cainiao.
Professor at the Florida Institute of Technology (FIT) teaching Information Technology, Information Security and Supply Chain Management to students through distance learning on the Blackboard LMS.
Professional Experience TLC Laser Eye Center (New York, NY) 2005 — 2008 Professional Relations Consultant • Responsible for the growth of referral volume within the five boroughs of New York • Generated 107 % growth across region after one quarter of management • Increased product and company awareness through direct mailings and other marketing efforts • Organized and hosted continuing education events for physicians and other medical personnel • Trained medical team in emerging Lasik technology use and patient counseling • Acquired large chain (Lens Crafters) to solely refer to all patients to TLC Laser Eye Center • Built and strengthened strong professional relationship with area physicians resulting in referrals
a b c d e f g h i j k l m n o p q r s t u v w x y z